Stijn Volckaert

Stijn Volckaert

Former Member

Stijn.Volckaert [AT]
+32 9 264 98 54 (phone)

System Software Lab
Computing Systems Lab (CSL)
Electronics and Information Systems (ELIS) department
Ghent University
Sint Pietersnieuwstraat 41
9000 Ghent


Research Project

Protection of Online Applications

    Publications to Appear


    Journal papers

    1. Stijn Volckaert, Bart Coppens and Bjorn De Sutter Cloning your gadgets : complete ROP attack immunity with multi-variant execution IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, Vol. 13(4), pp. 437-450 (2016)
    2. Stijn Volckaert, Bart Coppens and Bjorn De Sutter Cloning your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution IEEE Transactions on Dependable and Secure Computing, pp. (2015)

    Conference publications

    1. Bert Abrath, Bart Coppens, Stijn Volckaert, Joris Wijnant and Bjorn De Sutter Tightly-coupled self-debugging software protection Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering - SSPREW '16, pp. 10 (2016)
    2. Stijn Volckaert, Bart Coppens, Alexios Voulimeneas, Andrei Homescu, Per Larsen, Bjorn De Sutter and Michael Franz Secure and efficient application monitoring and replication PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, pp. 167-179 (2016)
    3. Stephen Crane, Stijn Volckaert, Felix Schuster, Christopher Liebchen, Per Larsen, Lucas Davi, Ahmad-Reza Sadeghi, Bjorn De Sutter and Michael Franz It's a TRaP : table randomization and protection against function-reuse attacks 22nd ACM SIGSAC Conference on Computer and Communications Security, Proceedings, pp. 243-255 (2015)
    4. Bert Abrath, Bart Coppens, Stijn Volckaert and Bjorn De Sutter Obfuscating windows DLLs Workshop on Software Protection, Proceedings, pp. 7 (2015)
    5. Stijn Volckaert, Bjorn De Sutter, Tim De Baets and Koen De Bosschere GHUMVEE : efficient, effective, and flexible replication Foundations and practice of security : 5th International Symposium, Proceedings, pp. 261-277 (2013)
    6. Daan Raman, Bjorn De Sutter, Bart Coppens, Stijn Volckaert, Koen De Bosschere, Pieter Danhieux and Erik Van Buggenhout DNS tunneling for network penetration Information Security and Cryptology - ICISC 2012. 15th International Conference. Revised Selected Papers, Vol. 7839, pp. 65-77 (2012)

    Other publications

    1. Stijn Volckaert, Bart Coppens, Bjorn De Sutter, Koen De Bosschere, Per Larsen and Michael Franz Taming Parallelism in a Multi-Variant Execution Environment European Conference on Computer Systems, pp. (2017)